xref: /aosp_15_r20/external/googleapis/google/cloud/securitycenter/v1/mitre_attack.proto (revision d5c09012810ac0c9f33fe448fb6da8260d444cc9)
1// Copyright 2023 Google LLC
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7//     http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15syntax = "proto3";
16
17package google.cloud.securitycenter.v1;
18
19option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
20option go_package = "cloud.google.com/go/securitycenter/apiv1/securitycenterpb;securitycenterpb";
21option java_multiple_files = true;
22option java_outer_classname = "MitreAttackProto";
23option java_package = "com.google.cloud.securitycenter.v1";
24option php_namespace = "Google\\Cloud\\SecurityCenter\\V1";
25option ruby_package = "Google::Cloud::SecurityCenter::V1";
26
27// MITRE ATT&CK tactics and techniques related to this finding.
28// See: https://attack.mitre.org
29message MitreAttack {
30  // MITRE ATT&CK tactics that can be referenced by SCC findings.
31  // See: https://attack.mitre.org/tactics/enterprise/
32  enum Tactic {
33    // Unspecified value.
34    TACTIC_UNSPECIFIED = 0;
35
36    // TA0043
37    RECONNAISSANCE = 1;
38
39    // TA0042
40    RESOURCE_DEVELOPMENT = 2;
41
42    // TA0001
43    INITIAL_ACCESS = 5;
44
45    // TA0002
46    EXECUTION = 3;
47
48    // TA0003
49    PERSISTENCE = 6;
50
51    // TA0004
52    PRIVILEGE_ESCALATION = 8;
53
54    // TA0005
55    DEFENSE_EVASION = 7;
56
57    // TA0006
58    CREDENTIAL_ACCESS = 9;
59
60    // TA0007
61    DISCOVERY = 10;
62
63    // TA0008
64    LATERAL_MOVEMENT = 11;
65
66    // TA0009
67    COLLECTION = 12;
68
69    // TA0011
70    COMMAND_AND_CONTROL = 4;
71
72    // TA0010
73    EXFILTRATION = 13;
74
75    // TA0040
76    IMPACT = 14;
77  }
78
79  // MITRE ATT&CK techniques that can be referenced by SCC findings.
80  // See: https://attack.mitre.org/techniques/enterprise/
81  // Next ID: 59
82  enum Technique {
83    // Unspecified value.
84    TECHNIQUE_UNSPECIFIED = 0;
85
86    // T1036
87    MASQUERADING = 49;
88
89    // T1036.005
90    MATCH_LEGITIMATE_NAME_OR_LOCATION = 50;
91
92    // T1037
93    BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37;
94
95    // T1037.005
96    STARTUP_ITEMS = 38;
97
98    // T1046
99    NETWORK_SERVICE_DISCOVERY = 32;
100
101    // T1057
102    PROCESS_DISCOVERY = 56;
103
104    // T1059
105    COMMAND_AND_SCRIPTING_INTERPRETER = 6;
106
107    // T1059.004
108    UNIX_SHELL = 7;
109
110    // T1069
111    PERMISSION_GROUPS_DISCOVERY = 18;
112
113    // T1069.003
114    CLOUD_GROUPS = 19;
115
116    // T1071
117    APPLICATION_LAYER_PROTOCOL = 45;
118
119    // T1071.004
120    DNS = 46;
121
122    // T1072
123    SOFTWARE_DEPLOYMENT_TOOLS = 47;
124
125    // T1078
126    VALID_ACCOUNTS = 14;
127
128    // T1078.001
129    DEFAULT_ACCOUNTS = 35;
130
131    // T1078.003
132    LOCAL_ACCOUNTS = 15;
133
134    // T1078.004
135    CLOUD_ACCOUNTS = 16;
136
137    // T1090
138    PROXY = 9;
139
140    // T1090.002
141    EXTERNAL_PROXY = 10;
142
143    // T1090.003
144    MULTI_HOP_PROXY = 11;
145
146    // T1098
147    ACCOUNT_MANIPULATION = 22;
148
149    // T1098.001
150    ADDITIONAL_CLOUD_CREDENTIALS = 40;
151
152    // T1098.004
153    SSH_AUTHORIZED_KEYS = 23;
154
155    // T1098.006
156    ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58;
157
158    // T1105
159    INGRESS_TOOL_TRANSFER = 3;
160
161    // T1106
162    NATIVE_API = 4;
163
164    // T1110
165    BRUTE_FORCE = 44;
166
167    // T1129
168    SHARED_MODULES = 5;
169
170    // T1134
171    ACCESS_TOKEN_MANIPULATION = 33;
172
173    // T1134.001
174    TOKEN_IMPERSONATION_OR_THEFT = 39;
175
176    // T1190
177    EXPLOIT_PUBLIC_FACING_APPLICATION = 27;
178
179    // T1484
180    DOMAIN_POLICY_MODIFICATION = 30;
181
182    // T1485
183    DATA_DESTRUCTION = 29;
184
185    // T1489
186    SERVICE_STOP = 52;
187
188    // T1490
189    INHIBIT_SYSTEM_RECOVERY = 36;
190
191    // T1496
192    RESOURCE_HIJACKING = 8;
193
194    // T1498
195    NETWORK_DENIAL_OF_SERVICE = 17;
196
197    // T1526
198    CLOUD_SERVICE_DISCOVERY = 48;
199
200    // T1528
201    STEAL_APPLICATION_ACCESS_TOKEN = 42;
202
203    // T1531
204    ACCOUNT_ACCESS_REMOVAL = 51;
205
206    // T1539
207    STEAL_WEB_SESSION_COOKIE = 25;
208
209    // T1543
210    CREATE_OR_MODIFY_SYSTEM_PROCESS = 24;
211
212    // T1548
213    ABUSE_ELEVATION_CONTROL_MECHANISM = 34;
214
215    // T1552
216    UNSECURED_CREDENTIALS = 13;
217
218    // T1556
219    MODIFY_AUTHENTICATION_PROCESS = 28;
220
221    // T1562
222    IMPAIR_DEFENSES = 31;
223
224    // T1562.001
225    DISABLE_OR_MODIFY_TOOLS = 55;
226
227    // T1567
228    EXFILTRATION_OVER_WEB_SERVICE = 20;
229
230    // T1567.002
231    EXFILTRATION_TO_CLOUD_STORAGE = 21;
232
233    // T1568
234    DYNAMIC_RESOLUTION = 12;
235
236    // T1570
237    LATERAL_TOOL_TRANSFER = 41;
238
239    // T1578
240    MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26;
241
242    // T1578.001
243    CREATE_SNAPSHOT = 54;
244
245    // T1580
246    CLOUD_INFRASTRUCTURE_DISCOVERY = 53;
247
248    // T1588
249    OBTAIN_CAPABILITIES = 43;
250
251    // T1595
252    ACTIVE_SCANNING = 1;
253
254    // T1595.001
255    SCANNING_IP_BLOCKS = 2;
256
257    // T1613
258    CONTAINER_AND_RESOURCE_DISCOVERY = 57;
259  }
260
261  // The MITRE ATT&CK tactic most closely represented by this finding, if any.
262  Tactic primary_tactic = 1;
263
264  // The MITRE ATT&CK technique most closely represented by this finding, if
265  // any. primary_techniques is a repeated field because there are multiple
266  // levels of MITRE ATT&CK techniques.  If the technique most closely
267  // represented by this finding is a sub-technique (e.g. `SCANNING_IP_BLOCKS`),
268  // both the sub-technique and its parent technique(s) will be listed (e.g.
269  // `SCANNING_IP_BLOCKS`, `ACTIVE_SCANNING`).
270  repeated Technique primary_techniques = 2;
271
272  // Additional MITRE ATT&CK tactics related to this finding, if any.
273  repeated Tactic additional_tactics = 3;
274
275  // Additional MITRE ATT&CK techniques related to this finding, if any, along
276  // with any of their respective parent techniques.
277  repeated Technique additional_techniques = 4;
278
279  // The MITRE ATT&CK version referenced by the above fields. E.g. "8".
280  string version = 5;
281}
282